If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

I know that in Windows NT there was a registry key you could turn on to enable promiscous mode for the Network Monitor...
I don't think that needed any special hardware to run, but all you could see were the transfer statistics, you couldn't actually read the data inside the individual packet...

What OS are you coding for?

-Matty_Cross
\"Isn\'t sanity just a one trick pony anyway? I mean, all you get is one trick. Rational Thinking.
But when you\'re good and crazy, hehe, the skies the limit!!\"

I feel that if you want to develop a Sniffer before you even think about coding you will have to gain a good conceptual understanding of how the lower levels of the Systems work, and at what level you wish to intercept the traffic I.E. after the NDIS Before IP etc.

You donít need to have the NIC in promiscuous mode to sniff packets, however I would recommend getting hold of an open source analyzer and having a play. I believe there are some out there.

The next problem is what are you going to do with the packets once you have captured them, are you going to decode the protocols and so on.

What you are proposing in not a straightforward task and there are many very capable analyzers available.